xrdp/sesman/session.c

1372 lines
44 KiB
C
Raw Normal View History

/**
* xrdp: A Remote Desktop Protocol server.
*
2015-12-12 07:41:17 +03:00
* Copyright (C) Jay Sorg 2004-2015
*
* BSD process grouping by:
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland.
* Copyright (c) 2000-2001 Markus Friedl.
* Copyright (c) 2011-2015 Koichiro Iwao, Kyushu Institute of Technology.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
2006-05-26 00:34:32 +04:00
/**
*
* @file session.c
* @brief Session management code
* @author Jay Sorg, Simone Fedele
*
2006-05-26 00:34:32 +04:00
*/
#if defined(HAVE_CONFIG_H)
#include "config_ac.h"
#endif
#ifdef HAVE_SYS_PRCTL_H
#include <sys/prctl.h>
#endif
#include "sesman.h"
2006-11-05 16:11:20 +03:00
#include "libscp_types.h"
#include "xauth.h"
#include "xrdp_sockets.h"
#include "string_calls.h"
#ifndef PR_SET_NO_NEW_PRIVS
#define PR_SET_NO_NEW_PRIVS 38
#endif
struct session_chain *g_sessions;
int g_session_count;
extern tbus g_term_event; /* in sesman.c */
2009-01-12 09:43:58 +03:00
2012-05-27 19:17:39 +04:00
/**
* Creates a string consisting of all parameters that is hosted in the param list
* @param self
* @param outstr, allocate this buffer before you use this function
* @param len the allocated len for outstr
* @return
*/
2017-03-12 19:35:00 +03:00
char *
dumpItemsToString(struct list *self, char *outstr, int len)
2012-05-27 19:17:39 +04:00
{
int index;
int totalLen = 0;
2013-10-01 21:42:00 +04:00
g_memset(outstr, 0, len);
if (self->count == 0)
{
LOG_DEVEL(LOG_LEVEL_TRACE, "List is empty");
}
for (index = 0; index < self->count; index++)
{
/* +1 = one space*/
totalLen = totalLen + g_strlen((char *)list_get_item(self, index)) + 1;
if (len > totalLen)
{
g_strcat(outstr, (char *)list_get_item(self, index));
g_strcat(outstr, " ");
}
}
return outstr ;
2012-05-27 19:17:39 +04:00
}
/******************************************************************************/
2017-03-12 19:35:00 +03:00
struct session_item *
session_get_bydata(const char *name, int width, int height, int bpp, int type,
const char *connection_description)
{
struct session_chain *tmp;
enum SESMAN_CFG_SESS_POLICY policy = g_cfg->sess.policy;
char ip[64];
tmp = g_sessions;
/* convert from SCP_SESSION_TYPE namespace to SESMAN_SESSION_TYPE namespace */
switch (type)
{
case SCP_SESSION_TYPE_XVNC: /* 0 */
type = SESMAN_SESSION_TYPE_XVNC; /* 2 */
break;
case SCP_SESSION_TYPE_XRDP: /* 1 */
type = SESMAN_SESSION_TYPE_XRDP; /* 1 */
break;
case SCP_SESSION_TYPE_XORG:
2014-03-22 18:07:06 +04:00
type = SESMAN_SESSION_TYPE_XORG;
break;
default:
return 0;
2011-08-24 06:27:12 +04:00
}
if ((policy & SESMAN_CFG_SESS_POLICY_I) != 0)
{
/* We'll need to compare on IP addresses */
g_get_ip_from_description(connection_description, ip, sizeof(ip));
}
else
{
ip[0] = '\0';
}
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG,
"session_get_bydata: search policy %d U %s W %d H %d bpp %d T %d IP %s",
policy, name, width, height, bpp, type, connection_description);
while (tmp != 0)
{
char tmp_ip[64];
if ((policy & SESMAN_CFG_SESS_POLICY_I) != 0)
{
g_get_ip_from_description(tmp->item->connection_description,
tmp_ip, sizeof (tmp_ip));
}
else
{
tmp_ip[0] = '\0';
}
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG,
"session_get_bydata: try %p U %s W %d H %d bpp %d T %d IP %s",
tmp->item,
tmp->item->name,
tmp->item->width, tmp->item->height,
tmp->item->bpp, tmp->item->type,
tmp->item->connection_description);
if (g_strncmp(name, tmp->item->name, 255) == 0 &&
(!(policy & SESMAN_CFG_SESS_POLICY_D) ||
(tmp->item->width == width && tmp->item->height == height)) &&
(!(policy & SESMAN_CFG_SESS_POLICY_I) ||
(g_strcmp(ip, tmp_ip) == 0)) &&
(!(policy & SESMAN_CFG_SESS_POLICY_C) ||
(g_strncmp(connection_description, tmp->item->connection_description, 255) == 0)) &&
tmp->item->bpp == bpp &&
tmp->item->type == type)
{
return tmp->item;
}
tmp = tmp->next;
}
2007-02-01 09:43:06 +03:00
return 0;
}
/******************************************************************************/
2006-05-26 00:34:32 +04:00
/**
*
* @brief checks if there's a server running on a display
* @param display the display to check
* @return 0 if there isn't a display running, nonzero otherwise
*
*/
2017-03-12 19:35:00 +03:00
static int
2009-08-06 23:01:09 +04:00
x_server_running_check_ports(int display)
{
char text[256];
int x_running;
int sck;
g_sprintf(text, "/tmp/.X11-unix/X%d", display);
x_running = g_file_exist(text);
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, "/tmp/.X%d-lock", display);
x_running = g_file_exist(text);
}
if (!x_running) /* check 59xx */
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
if ((sck = g_tcp_socket()) != -1)
{
g_sprintf(text, "59%2.2d", display);
x_running = g_tcp_bind(sck, text);
g_tcp_close(sck);
}
}
if (!x_running) /* check 60xx */
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
if ((sck = g_tcp_socket()) != -1)
{
g_sprintf(text, "60%2.2d", display);
x_running = g_tcp_bind(sck, text);
g_tcp_close(sck);
}
}
if (!x_running) /* check 62xx */
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
if ((sck = g_tcp_socket()) != -1)
{
g_sprintf(text, "62%2.2d", display);
x_running = g_tcp_bind(sck, text);
g_tcp_close(sck);
}
}
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, XRDP_CHANSRV_STR, display);
x_running = g_file_exist(text);
}
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, CHANSRV_PORT_OUT_STR, display);
x_running = g_file_exist(text);
}
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, CHANSRV_PORT_IN_STR, display);
x_running = g_file_exist(text);
}
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, CHANSRV_API_STR, display);
x_running = g_file_exist(text);
}
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, XRDP_X11RDP_STR, display);
x_running = g_file_exist(text);
}
2020-07-30 06:10:23 +03:00
if (x_running)
{
LOG(LOG_LEVEL_INFO, "Found X server running at %s", text);
}
return x_running;
}
2009-08-06 23:01:09 +04:00
/******************************************************************************/
/**
*
* @brief checks if there's a server running on a display
* @param display the display to check
* @return 0 if there isn't a display running, nonzero otherwise
*
*/
2017-03-12 19:35:00 +03:00
static int
2009-08-06 23:01:09 +04:00
x_server_running(int display)
{
char text[256];
int x_running;
g_sprintf(text, "/tmp/.X11-unix/X%d", display);
2009-08-06 23:01:09 +04:00
x_running = g_file_exist(text);
if (!x_running)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
g_sprintf(text, "/tmp/.X%d-lock", display);
x_running = g_file_exist(text);
}
2020-07-30 06:10:23 +03:00
if (x_running)
{
LOG(LOG_LEVEL_INFO, "Found X server running at %s", text);
}
else
{
LOG(LOG_LEVEL_DEBUG, "Did not find a running X server at %s", text);
}
return x_running;
2009-08-06 23:01:09 +04:00
}
/******************************************************************************/
/* called with the main thread
returns boolean */
2017-03-12 19:35:00 +03:00
static int
session_is_display_in_chain(int display)
{
struct session_chain *chain;
struct session_item *item;
chain = g_sessions;
while (chain != 0)
{
item = chain->item;
if (item->display == display)
{
return 1;
}
chain = chain->next;
}
return 0;
}
/******************************************************************************/
/* called with the main thread */
2017-03-12 19:35:00 +03:00
static int
2016-02-14 07:41:07 +03:00
session_get_avail_display_from_chain(void)
{
int display;
display = g_cfg->sess.x11_display_offset;
while ((display - g_cfg->sess.x11_display_offset) <= g_cfg->sess.max_sessions)
{
if (!session_is_display_in_chain(display))
{
if (!x_server_running_check_ports(display))
{
return display;
}
}
display++;
}
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "X server -- no display in range (%d to %d) is available",
g_cfg->sess.x11_display_offset,
g_cfg->sess.x11_display_offset + g_cfg->sess.max_sessions);
return 0;
}
2009-08-27 06:16:34 +04:00
/******************************************************************************/
2017-03-12 19:35:00 +03:00
static int
2009-08-27 06:16:34 +04:00
wait_for_xserver(int display)
{
int i;
/* give X a bit to start */
/* wait up to 10 secs for x server to start */
i = 0;
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Waiting for X server to start on display %d", display);
2021-05-08 19:58:11 +03:00
while (!x_server_running(display))
{
i++;
if (i > 40)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_WARNING,
"Timed out waiting for X server on display %d to startup",
display);
break;
}
g_sleep(250);
}
return 0;
2009-08-27 06:16:34 +04:00
}
/******************************************************************************/
static int
session_start_chansrv(char *username, int display)
{
struct list *chansrv_params;
char exe_path[262];
int chansrv_pid;
chansrv_pid = g_fork();
if (chansrv_pid == 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO,
"Starting the xrdp channel server for display %d", display);
2017-12-15 11:52:39 +03:00
chansrv_params = list_create();
chansrv_params->auto_free = 1;
/* building parameters */
g_snprintf(exe_path, sizeof(exe_path), "%s/xrdp-chansrv",
XRDP_SBIN_PATH);
2021-05-08 19:58:11 +03:00
list_add_item(chansrv_params, (intptr_t) g_strdup(exe_path));
list_add_item(chansrv_params, 0); /* mandatory */
env_set_user(username, 0, display,
g_cfg->env_names,
g_cfg->env_values);
/* executing chansrv */
g_execvp(exe_path, (char **) (chansrv_params->items));
2021-05-08 19:58:11 +03:00
/* should not get here */
list_delete(chansrv_params);
g_exit(1);
}
return chansrv_pid;
}
/******************************************************************************/
2009-01-12 09:43:58 +03:00
/* called with the main thread */
2017-03-12 19:35:00 +03:00
static int
session_start_fork(tbus data, tui8 type, struct SCP_SESSION *s)
{
int display = 0;
int pid = 0;
char geometry[32];
char depth[32];
char screen[32]; /* display number */
char text[256];
char execvpparams[2048];
2020-07-30 06:10:23 +03:00
char *xserver = NULL; /* absolute/relative path to Xorg/X11rdp/Xvnc */
char *passwd_file;
char **pp1 = (char **)NULL;
struct session_chain *temp = (struct session_chain *)NULL;
struct list *xserver_params = (struct list *)NULL;
struct tm stime;
time_t ltime;
2016-12-14 09:16:06 +03:00
char authfile[256]; /* The filename for storing xauth informations */
int chansrv_pid;
int display_pid;
int window_manager_pid;
/* initialize (zero out) local variables: */
g_memset(&ltime, 0, sizeof(time_t));
g_memset(&stime, 0, sizeof(struct tm));
g_memset(geometry, 0, sizeof(char) * 32);
g_memset(depth, 0, sizeof(char) * 32);
g_memset(screen, 0, sizeof(char) * 32);
g_memset(text, 0, sizeof(char) * 256);
passwd_file = 0;
/* check to limit concurrent sessions */
if (g_session_count >= g_cfg->sess.max_sessions)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "max concurrent session limit "
"exceeded. login for user %s denied", s->username);
return 0;
}
2006-02-05 08:46:48 +03:00
temp = (struct session_chain *)g_malloc(sizeof(struct session_chain), 0);
if (temp == 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "Out of memory error: cannot create new session "
"chain element - user %s", s->username);
return 0;
}
temp->item = (struct session_item *)g_malloc(sizeof(struct session_item), 0);
if (temp->item == 0)
{
g_free(temp);
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "Out of memory error: cannot create new session "
"item - user %s", s->username);
return 0;
}
2016-02-14 07:41:07 +03:00
display = session_get_avail_display_from_chain();
if (display == 0)
{
g_free(temp->item);
g_free(temp);
return 0;
}
2016-02-14 07:41:07 +03:00
pid = g_fork(); /* parent is fork from tcp accept,
2015-12-12 07:41:17 +03:00
child forks X and wm, then becomes scp */
if (pid == -1)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR,
"[session start] (display %d): Failed to fork for scp with "
"errno: %d, description: %s",
display, g_get_errno(), g_get_strerror());
}
2015-12-12 07:41:17 +03:00
else if (pid == 0)
{
2021-05-08 19:58:11 +03:00
LOG(LOG_LEVEL_INFO,
2020-07-30 06:10:23 +03:00
"[session start] (display %d): calling auth_start_session from pid %d",
display, g_getpid());
2021-06-22 15:38:46 +03:00
/* Clone the session object, as the passed-in copy will be
* deleted by sesman_close_all() */
if ((s = scp_session_clone(s)) == NULL)
{
LOG(LOG_LEVEL_ERROR,
"Failed to clone the session data - out of memory");
g_exit(1);
}
auth_start_session(data, display);
g_delete_wait_obj(g_term_event);
sesman_close_all();
g_sprintf(geometry, "%dx%d", s->width, s->height);
g_sprintf(depth, "%d", s->bpp);
g_sprintf(screen, ":%d", display);
#if defined(__FreeBSD__) || defined(__FreeBSD_kernel__)
/*
* FreeBSD bug
* ports/157282: effective login name is not set by xrdp-sesman
* http://www.freebsd.org/cgi/query-pr.cgi?pr=157282
*
* from:
* $OpenBSD: session.c,v 1.252 2010/03/07 11:57:13 dtucker Exp $
* with some ideas about BSD process grouping to xrdp
*/
pid_t bsdsespid = g_fork();
if (bsdsespid == -1)
{
}
else if (bsdsespid == 0) /* BSD session leader */
{
/**
* Create a new session and process group since the 4.4BSD
* setlogin() affects the entire process group
*/
if (g_setsid() < 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_WARNING,
2021-05-08 19:58:11 +03:00
"[session start] (display %d): setsid failed - pid %d",
2020-07-30 06:10:23 +03:00
display, g_getpid());
}
if (g_setlogin(s->username) < 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_WARNING,
"[session start] (display %d): setlogin failed for user %s - pid %d",
display, s->username, g_getpid());
}
}
g_waitpid(bsdsespid);
if (bsdsespid > 0)
{
g_exit(0);
/*
* intermediate sesman should exit here after WM exits.
* do not execure the following codes.
*/
}
#endif
window_manager_pid = g_fork(); /* parent becomes X,
2015-12-12 07:41:17 +03:00
child forks wm, and waits, todo */
if (window_manager_pid == -1)
2006-02-05 08:46:48 +03:00
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR,
"Failed to fork for the window manager on display %d", display);
2006-02-05 08:46:48 +03:00
}
else if (window_manager_pid == 0)
2006-02-05 08:46:48 +03:00
{
wait_for_xserver(display);
env_set_user(s->username,
0,
display,
g_cfg->env_names,
g_cfg->env_values);
if (x_server_running(display))
2013-10-01 21:42:00 +04:00
{
auth_set_env(data);
if (s->directory != 0)
{
if (s->directory[0] != 0)
{
g_set_current_dir(s->directory);
}
}
2020-07-30 06:10:23 +03:00
if (s->program != 0 && s->program[0] != 0)
{
2020-07-30 06:10:23 +03:00
if (g_strchr(s->program, ' ') != 0 || g_strchr(s->program, '\t') != 0)
{
LOG(LOG_LEVEL_INFO,
"Starting user requested window manager on "
2021-05-08 19:58:11 +03:00
"display %d with embeded arguments using a shell: %s",
2020-07-30 06:10:23 +03:00
display, s->program);
const char *params[] = {"sh", "-c", s->program, NULL};
g_execvp("/bin/sh", (char **)params);
}
else
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO,
"Starting user requested window manager on "
"display %d: %s", display, s->program);
g_execlp3(s->program, s->program, 0);
}
2013-10-01 21:42:00 +04:00
}
2020-07-30 06:10:23 +03:00
else
{
LOG(LOG_LEVEL_DEBUG, "The user session on display %d did "
"not request a specific window manager", display);
}
2021-05-08 19:58:11 +03:00
/* try to execute user window manager if enabled */
if (g_cfg->enable_user_wm)
2013-10-01 21:42:00 +04:00
{
g_sprintf(text, "%s/%s", g_getenv("HOME"), g_cfg->user_wm);
if (g_file_exist(text))
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO,
"Starting window manager on display %d"
"from user home directory: %s", display, text);
g_execlp3(text, g_cfg->user_wm, 0);
2020-07-30 06:10:23 +03:00
}
else
{
2021-05-08 19:58:11 +03:00
LOG(LOG_LEVEL_DEBUG,
2020-07-30 06:10:23 +03:00
"The user home directory window manager configuration "
2021-05-08 19:58:11 +03:00
"is enabled but window manager program does not exist: %s",
text);
}
}
2021-05-08 19:58:11 +03:00
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO,
2021-05-08 19:58:11 +03:00
"Starting the default window manager on display %d: %s",
2020-07-30 06:10:23 +03:00
display, g_cfg->default_wm);
g_execlp3(g_cfg->default_wm, g_cfg->default_wm, 0);
/* still a problem starting window manager just start xterm */
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_WARNING,
"No window manager on display %d started, "
"so falling back to starting xterm for user debugging",
display);
g_execlp3("xterm", "xterm", 0);
/* should not get here */
}
else
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR,
"There is no X server active on display %d", display);
}
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "A fatal error has occured attempting to start "
"the window manager on display %d, aborting connection",
display);
g_exit(0);
2006-02-05 08:46:48 +03:00
}
2015-12-12 07:41:17 +03:00
else
{
display_pid = g_fork(); /* parent becomes scp,
2015-12-12 07:41:17 +03:00
child becomes X */
if (display_pid == -1)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR,
"Failed to fork for the X server on display %d", display);
}
else if (display_pid == 0) /* child */
{
if (type == SESMAN_SESSION_TYPE_XVNC)
{
env_set_user(s->username,
&passwd_file,
display,
g_cfg->env_names,
g_cfg->env_values);
}
else
{
env_set_user(s->username,
0,
display,
g_cfg->env_names,
g_cfg->env_values);
}
2020-07-30 06:10:23 +03:00
/* setting Xserver environment variables */
g_snprintf(text, 255, "%d", g_cfg->sess.max_idle_time);
g_setenv("XRDP_SESMAN_MAX_IDLE_TIME", text, 1);
g_snprintf(text, 255, "%d", g_cfg->sess.max_disc_time);
g_setenv("XRDP_SESMAN_MAX_DISC_TIME", text, 1);
g_snprintf(text, 255, "%d", g_cfg->sess.kill_disconnected);
g_setenv("XRDP_SESMAN_KILL_DISCONNECTED", text, 1);
g_setenv("XRDP_SOCKET_PATH", XRDP_SOCKET_PATH, 1);
/* prepare the Xauthority stuff */
if (g_getenv("XAUTHORITY") != NULL)
{
g_snprintf(authfile, 255, "%s", g_getenv("XAUTHORITY"));
}
else
{
g_snprintf(authfile, 255, "%s", ".Xauthority");
}
/* Add the entry in XAUTHORITY file or exit if error */
if (add_xauth_cookie(display, authfile) != 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR,
"Error setting the xauth cookie for display %d in file %s",
display, authfile);
2021-05-08 19:58:11 +03:00
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "A fatal error has occured attempting to start "
"the X server on display %d, aborting connection",
display);
g_exit(1);
}
if (type == SESMAN_SESSION_TYPE_XORG)
{
#ifdef HAVE_SYS_PRCTL_H
/*
* Make sure Xorg doesn't run setuid root. Root access is not
* needed. Xorg can fail when run as root and the user has no
* console permissions.
* PR_SET_NO_NEW_PRIVS requires Linux kernel 3.5 and newer.
*/
if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) < 0)
{
LOG(LOG_LEVEL_WARNING,
2020-07-30 06:10:23 +03:00
"[session start] (display %d): Failed to disable "
"setuid on X server: %s",
display, g_get_strerror());
}
#endif
xserver_params = list_create();
xserver_params->auto_free = 1;
/* get path of Xorg from config */
xserver = g_strdup((const char *)list_get_item(g_cfg->xorg_params, 0));
/* these are the must have parameters */
list_add_item(xserver_params, (tintptr) g_strdup(xserver));
2015-12-12 07:41:17 +03:00
list_add_item(xserver_params, (tintptr) g_strdup(screen));
list_add_item(xserver_params, (tintptr) g_strdup("-auth"));
list_add_item(xserver_params, (tintptr) g_strdup(authfile));
/* additional parameters from sesman.ini file */
list_append_list_strdup(g_cfg->xorg_params, xserver_params, 1);
/* make sure it ends with a zero */
list_add_item(xserver_params, 0);
pp1 = (char **) xserver_params->items;
/* some args are passed via env vars */
g_sprintf(geometry, "%d", s->width);
g_setenv("XRDP_START_WIDTH", geometry, 1);
g_sprintf(geometry, "%d", s->height);
g_setenv("XRDP_START_HEIGHT", geometry, 1);
}
else if (type == SESMAN_SESSION_TYPE_XVNC)
{
char guid_str[GUID_STR_SIZE];
guid_to_str(&s->guid, guid_str);
2016-12-05 02:39:10 +03:00
env_check_password_file(passwd_file, guid_str);
xserver_params = list_create();
xserver_params->auto_free = 1;
/* get path of Xvnc from config */
xserver = g_strdup((const char *)list_get_item(g_cfg->vnc_params, 0));
/* these are the must have parameters */
list_add_item(xserver_params, (tintptr)g_strdup(xserver));
2015-12-12 07:41:17 +03:00
list_add_item(xserver_params, (tintptr)g_strdup(screen));
list_add_item(xserver_params, (tintptr)g_strdup("-auth"));
list_add_item(xserver_params, (tintptr)g_strdup(authfile));
2015-12-12 07:41:17 +03:00
list_add_item(xserver_params, (tintptr)g_strdup("-geometry"));
list_add_item(xserver_params, (tintptr)g_strdup(geometry));
list_add_item(xserver_params, (tintptr)g_strdup("-depth"));
list_add_item(xserver_params, (tintptr)g_strdup(depth));
list_add_item(xserver_params, (tintptr)g_strdup("-rfbauth"));
list_add_item(xserver_params, (tintptr)g_strdup(passwd_file));
g_free(passwd_file);
/* additional parameters from sesman.ini file */
//config_read_xserver_params(SESMAN_SESSION_TYPE_XVNC,
// xserver_params);
list_append_list_strdup(g_cfg->vnc_params, xserver_params, 1);
/* make sure it ends with a zero */
list_add_item(xserver_params, 0);
pp1 = (char **)xserver_params->items;
}
else if (type == SESMAN_SESSION_TYPE_XRDP)
{
xserver_params = list_create();
xserver_params->auto_free = 1;
/* get path of X11rdp from config */
xserver = g_strdup((const char *)list_get_item(g_cfg->rdp_params, 0));
/* these are the must have parameters */
list_add_item(xserver_params, (tintptr)g_strdup(xserver));
2015-12-12 07:41:17 +03:00
list_add_item(xserver_params, (tintptr)g_strdup(screen));
list_add_item(xserver_params, (tintptr)g_strdup("-auth"));
list_add_item(xserver_params, (tintptr)g_strdup(authfile));
2015-12-12 07:41:17 +03:00
list_add_item(xserver_params, (tintptr)g_strdup("-geometry"));
list_add_item(xserver_params, (tintptr)g_strdup(geometry));
list_add_item(xserver_params, (tintptr)g_strdup("-depth"));
list_add_item(xserver_params, (tintptr)g_strdup(depth));
/* additional parameters from sesman.ini file */
//config_read_xserver_params(SESMAN_SESSION_TYPE_XRDP,
// xserver_params);
list_append_list_strdup(g_cfg->rdp_params, xserver_params, 1);
/* make sure it ends with a zero */
list_add_item(xserver_params, 0);
pp1 = (char **)xserver_params->items;
}
else
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "Unknown session type: %d", type);
LOG(LOG_LEVEL_ERROR, "A fatal error has occured attempting "
"to start the X server on display %d, aborting connection",
display);
g_exit(1);
}
2020-07-30 06:10:23 +03:00
/* fire up X server */
2021-05-08 19:58:11 +03:00
LOG(LOG_LEVEL_INFO, "Starting X server on display %d: %s",
2020-07-30 06:10:23 +03:00
display, dumpItemsToString(xserver_params, execvpparams, 2048));
g_execvp(xserver, pp1);
2021-05-08 19:58:11 +03:00
/* should not get here */
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR,
"Error starting X server on display %d", display);
LOG(LOG_LEVEL_ERROR, "A fatal error has occured attempting "
"to start the X server on display %d, aborting connection",
display);
2021-05-08 19:58:11 +03:00
list_delete(xserver_params);
g_exit(1);
}
2015-12-12 07:41:17 +03:00
else
{
2020-12-14 14:35:31 +03:00
int wm_wait_time;
2020-07-30 06:10:23 +03:00
struct exit_status wm_exit_status;
struct exit_status xserver_exit_status;
struct exit_status chansrv_exit_status;
wait_for_xserver(display);
chansrv_pid = session_start_chansrv(s->username, display);
2020-12-14 14:35:31 +03:00
2021-05-08 19:58:11 +03:00
LOG(LOG_LEVEL_INFO,
2020-07-30 06:10:23 +03:00
"Session started successfully for user %s on display %d",
s->username, display);
2020-12-14 14:35:31 +03:00
/* Monitor the amount of time we wait for the
* window manager. This is approximately how long the window
* manager was running for */
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO, "Session in progress on display %d, waiting "
2021-05-08 19:58:11 +03:00
"until the window manager (pid %d) exits to end the session",
2020-07-30 06:10:23 +03:00
display, window_manager_pid);
2020-12-14 14:35:31 +03:00
wm_wait_time = g_time1();
2020-07-30 06:10:23 +03:00
wm_exit_status = g_waitpid_status(window_manager_pid);
2020-12-14 14:35:31 +03:00
wm_wait_time = g_time1() - wm_wait_time;
2020-07-30 06:10:23 +03:00
if (wm_exit_status.exit_code > 0)
{
LOG(LOG_LEVEL_WARNING, "Window manager (pid %d, display %d) "
"exited with non-zero exit code %d and signal %d. This "
"could indicate a window manager config problem",
window_manager_pid, display, wm_exit_status.exit_code,
wm_exit_status.signal_no);
}
2020-12-14 14:35:31 +03:00
if (wm_wait_time < 10)
{
/* This could be a config issue. Log a significant error */
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_WARNING, "Window manager (pid %d, display %d) "
"exited quickly (%d secs). This could indicate a window "
"manager config problem",
window_manager_pid, display, wm_wait_time);
2020-12-14 14:35:31 +03:00
}
else
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "Window manager (pid %d, display %d) "
"was running for %d seconds.",
window_manager_pid, display, wm_wait_time);
2020-12-14 14:35:31 +03:00
}
2021-05-08 19:58:11 +03:00
LOG(LOG_LEVEL_INFO,
2020-07-30 06:10:23 +03:00
"Calling auth_stop_session and auth_end from pid %d",
g_getpid());
auth_stop_session(data);
auth_end(data);
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO,
2021-05-08 19:58:11 +03:00
"Terminating X server (pid %d) on display %d",
2020-07-30 06:10:23 +03:00
display_pid, display);
g_sigterm(display_pid);
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO, "Terminating the xrdp channel server (pid %d) "
"on display %d", chansrv_pid, display);
g_sigterm(chansrv_pid);
/* make sure socket cleanup happen after child process exit */
2020-07-30 06:10:23 +03:00
xserver_exit_status = g_waitpid_status(display_pid);
LOG(LOG_LEVEL_INFO,
"X server on display %d (pid %d) returned exit code %d "
"and signal number %d",
2021-05-08 19:58:11 +03:00
display, display_pid, xserver_exit_status.exit_code,
2020-07-30 06:10:23 +03:00
xserver_exit_status.signal_no);
chansrv_exit_status = g_waitpid_status(chansrv_pid);
LOG(LOG_LEVEL_INFO,
"xrdp channel server for display %d (pid %d) "
"exit code %d and signal number %d",
display, chansrv_pid, chansrv_exit_status.exit_code,
chansrv_exit_status.signal_no);
cleanup_sockets(display);
g_deinit();
g_exit(0);
}
}
}
2015-12-12 07:41:17 +03:00
else
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO, "Starting session: session_pid %d, "
"display :%d.0, width %d, height %d, bpp %d, client ip %s, "
"user name %s",
pid, display, s->width, s->height, s->bpp, s->connection_description, s->username);
temp->item->pid = pid;
temp->item->display = display;
temp->item->width = s->width;
temp->item->height = s->height;
temp->item->bpp = s->bpp;
temp->item->data = data;
g_strncpy(temp->item->connection_description, s->connection_description, 255); /* store client ip data */
g_strncpy(temp->item->name, s->username, 255);
temp->item->guid = s->guid;
ltime = g_time1();
localtime_r(&ltime, &stime);
temp->item->connect_time.year = (tui16)(stime.tm_year + 1900);
temp->item->connect_time.month = (tui8)(stime.tm_mon + 1);
temp->item->connect_time.day = (tui8)stime.tm_mday;
temp->item->connect_time.hour = (tui8)stime.tm_hour;
temp->item->connect_time.minute = (tui8)stime.tm_min;
zero_time(&(temp->item->disconnect_time));
zero_time(&(temp->item->idle_time));
temp->item->type = type;
temp->item->status = SESMAN_SESSION_STATUS_ACTIVE;
temp->next = g_sessions;
g_sessions = temp;
g_session_count++;
2014-07-19 22:56:00 +04:00
return display;
}
2014-07-19 22:56:00 +04:00
g_free(temp->item);
g_free(temp);
return display;
2009-01-12 09:43:58 +03:00
}
/******************************************************************************/
/* called with the main thread */
2017-03-12 19:35:00 +03:00
static int
session_reconnect_fork(int display, char *username, long data)
{
int pid;
pid = g_fork();
if (pid == -1)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "Failed to fork for session reconnection script");
}
else if (pid == 0)
{
env_set_user(username,
0,
display,
g_cfg->env_names,
g_cfg->env_values);
auth_set_env(data);
if (g_file_exist(g_cfg->reconnect_sh))
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO,
"Starting session reconnection script on display %d: %s",
display, g_cfg->reconnect_sh);
g_execlp3(g_cfg->reconnect_sh, g_cfg->reconnect_sh, 0);
2020-07-30 06:10:23 +03:00
/* should not get here */
LOG(LOG_LEVEL_ERROR,
"Error starting session reconnection script on display %d: %s",
2021-05-08 19:58:11 +03:00
display, g_cfg->reconnect_sh);
2020-07-30 06:10:23 +03:00
}
else
{
LOG(LOG_LEVEL_WARNING,
"Session reconnection script file does not exist: %s",
g_cfg->reconnect_sh);
}
2020-07-30 06:10:23 +03:00
/* TODO: why is this existing with a success error code when the
reconnect script failed to be executed? */
g_exit(0);
}
return display;
}
2009-01-12 09:43:58 +03:00
/******************************************************************************/
/* called by a worker thread, ask the main thread to call session_sync_start
and wait till done */
2017-03-12 19:35:00 +03:00
int
session_start(long data, tui8 type, struct SCP_SESSION *s)
2009-01-12 09:43:58 +03:00
{
return session_start_fork(data, type, s);
}
/******************************************************************************/
/* called by a worker thread, ask the main thread to call session_sync_start
and wait till done */
2017-03-12 19:35:00 +03:00
int
session_reconnect(int display, char *username, long data)
{
return session_reconnect_fork(display, username, data);
2009-01-12 09:43:58 +03:00
}
/******************************************************************************/
2017-03-12 19:35:00 +03:00
int
session_kill(int pid)
{
struct session_chain *tmp;
struct session_chain *prev;
tmp = g_sessions;
prev = 0;
while (tmp != 0)
{
if (tmp->item == 0)
{
LOG(LOG_LEVEL_ERROR, "session descriptor for "
"pid %d is null!", pid);
if (prev == 0)
{
/* prev does no exist, so it's the first element - so we set
g_sessions */
g_sessions = tmp->next;
}
else
{
prev->next = tmp->next;
}
return SESMAN_SESSION_KILL_NULLITEM;
}
if (tmp->item->pid == pid)
{
/* deleting the session */
2021-05-08 19:58:11 +03:00
LOG(LOG_LEVEL_INFO,
"++ terminated session: username %s, display :%d.0, session_pid %d, ip %s",
tmp->item->name, tmp->item->display, tmp->item->pid, tmp->item->connection_description);
g_free(tmp->item);
if (prev == 0)
{
/* prev does no exist, so it's the first element - so we set
g_sessions */
g_sessions = tmp->next;
}
else
{
prev->next = tmp->next;
}
g_free(tmp);
g_session_count--;
return SESMAN_SESSION_KILL_OK;
}
/* go on */
prev = tmp;
tmp = tmp->next;
}
return SESMAN_SESSION_KILL_NOTFOUND;
}
/******************************************************************************/
2017-03-12 19:35:00 +03:00
void
session_sigkill_all(void)
{
struct session_chain *tmp;
tmp = g_sessions;
while (tmp != 0)
{
if (tmp->item == 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "found null session descriptor!");
}
else
{
g_sigterm(tmp->item->pid);
}
/* go on */
tmp = tmp->next;
}
}
/******************************************************************************/
2017-03-12 19:35:00 +03:00
struct session_item *
session_get_bypid(int pid)
{
struct session_chain *tmp;
struct session_item *dummy;
dummy = g_new0(struct session_item, 1);
2006-07-14 00:15:21 +04:00
if (0 == dummy)
{
LOG(LOG_LEVEL_ERROR, "session_get_bypid: out of memory");
return 0;
}
tmp = g_sessions;
while (tmp != 0)
{
if (tmp->item == 0)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_ERROR, "session descriptor for pid %d is null!", pid);
2014-07-19 22:56:00 +04:00
g_free(dummy);
return 0;
}
if (tmp->item->pid == pid)
{
g_memcpy(dummy, tmp->item, sizeof(struct session_item));
return dummy;
}
/* go on */
tmp = tmp->next;
}
2014-07-19 22:56:00 +04:00
g_free(dummy);
return 0;
}
2006-11-05 16:11:20 +03:00
/******************************************************************************/
struct SCP_DISCONNECTED_SESSION *
session_get_byuser(const char *user, int *cnt, unsigned char flags)
2006-11-05 16:11:20 +03:00
{
struct session_chain *tmp;
struct SCP_DISCONNECTED_SESSION *sess;
int count;
int index;
2006-11-05 16:11:20 +03:00
count = 0;
tmp = g_sessions;
2006-11-05 16:11:20 +03:00
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "searching for session by user: %s", user);
while (tmp != 0)
{
if ((NULL == user) || (!g_strncasecmp(user, tmp->item->name, 256)))
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_DEBUG, "session_get_byuser: status=%d, flags=%d, "
"result=%d", (tmp->item->status), flags,
((tmp->item->status) & flags));
if ((tmp->item->status) & flags)
{
count++;
}
}
/* go on */
tmp = tmp->next;
}
if (count == 0)
{
(*cnt) = 0;
return 0;
}
/* malloc() an array of disconnected sessions */
sess = g_new0(struct SCP_DISCONNECTED_SESSION, count);
if (sess == 0)
{
(*cnt) = 0;
return 0;
}
tmp = g_sessions;
index = 0;
while (tmp != 0)
{
/* #warning FIXME: we should get only disconnected sessions! */
if ((NULL == user) || (!g_strncasecmp(user, tmp->item->name, 256)))
{
if ((tmp->item->status) & flags)
{
(sess[index]).SID = tmp->item->pid;
(sess[index]).type = tmp->item->type;
(sess[index]).height = tmp->item->height;
(sess[index]).width = tmp->item->width;
(sess[index]).bpp = tmp->item->bpp;
/* #warning FIXME: setting idle times and such */
/*(sess[index]).connect_time.year = tmp->item->connect_time.year;
(sess[index]).connect_time.month = tmp->item->connect_time.month;
(sess[index]).connect_time.day = tmp->item->connect_time.day;
(sess[index]).connect_time.hour = tmp->item->connect_time.hour;
(sess[index]).connect_time.minute = tmp->item->connect_time.minute;
(sess[index]).disconnect_time.year = tmp->item->disconnect_time.year;
(sess[index]).disconnect_time.month = tmp->item->disconnect_time.month;
(sess[index]).disconnect_time.day = tmp->item->disconnect_time.day;
(sess[index]).disconnect_time.hour = tmp->item->disconnect_time.hour;
(sess[index]).disconnect_time.minute = tmp->item->disconnect_time.minute;
(sess[index]).idle_time.year = tmp->item->idle_time.year;
(sess[index]).idle_time.month = tmp->item->idle_time.month;
(sess[index]).idle_time.day = tmp->item->idle_time.day;
(sess[index]).idle_time.hour = tmp->item->idle_time.hour;
(sess[index]).idle_time.minute = tmp->item->idle_time.minute;*/
(sess[index]).conn_year = tmp->item->connect_time.year;
(sess[index]).conn_month = tmp->item->connect_time.month;
(sess[index]).conn_day = tmp->item->connect_time.day;
(sess[index]).conn_hour = tmp->item->connect_time.hour;
(sess[index]).conn_minute = tmp->item->connect_time.minute;
(sess[index]).idle_days = tmp->item->idle_time.day;
(sess[index]).idle_hours = tmp->item->idle_time.hour;
(sess[index]).idle_minutes = tmp->item->idle_time.minute;
index++;
}
}
/* go on */
tmp = tmp->next;
}
(*cnt) = count;
return sess;
2006-11-05 16:11:20 +03:00
}
/******************************************************************************/
int
cleanup_sockets(int display)
{
2020-07-30 06:10:23 +03:00
LOG(LOG_LEVEL_INFO, "cleanup_sockets:");
char file[256];
int error;
error = 0;
g_snprintf(file, 255, CHANSRV_PORT_OUT_STR, display);
if (g_file_exist(file))
{
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
if (g_file_delete(file) == 0)
{
LOG(LOG_LEVEL_WARNING,
"cleanup_sockets: failed to delete %s (%s)",
file, g_get_strerror());
error++;
}
}
g_snprintf(file, 255, CHANSRV_PORT_IN_STR, display);
if (g_file_exist(file))
{
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
if (g_file_delete(file) == 0)
{
LOG(LOG_LEVEL_WARNING,
"cleanup_sockets: failed to delete %s (%s)",
file, g_get_strerror());
error++;
}
}
g_snprintf(file, 255, XRDP_CHANSRV_STR, display);
if (g_file_exist(file))
{
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
if (g_file_delete(file) == 0)
{
LOG(LOG_LEVEL_WARNING,
"cleanup_sockets: failed to delete %s (%s)",
file, g_get_strerror());
error++;
}
}
g_snprintf(file, 255, CHANSRV_API_STR, display);
if (g_file_exist(file))
{
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
if (g_file_delete(file) == 0)
{
LOG(LOG_LEVEL_WARNING,
"cleanup_sockets: failed to delete %s (%s)",
file, g_get_strerror());
error++;
}
}
/* the following files should be deleted by xorgxrdp
* but just in case the deletion failed */
g_snprintf(file, 255, XRDP_X11RDP_STR, display);
if (g_file_exist(file))
{
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
if (g_file_delete(file) == 0)
{
LOG(LOG_LEVEL_WARNING,
"cleanup_sockets: failed to delete %s (%s)",
file, g_get_strerror());
error++;
}
}
g_snprintf(file, 255, XRDP_DISCONNECT_STR, display);
if (g_file_exist(file))
{
LOG(LOG_LEVEL_DEBUG, "cleanup_sockets: deleting %s", file);
if (g_file_delete(file) == 0)
{
LOG(LOG_LEVEL_WARNING,
"cleanup_sockets: failed to delete %s (%s)",
file, g_get_strerror());
error++;
}
}
return error;
}